"Determining their origins are extremely difficult. We don't know how the evidence in this so-called report can be tenable.

"Arbitrary criticism based on rudimentary data is irresponsible, unprofessional and not helpful in resolving the issue."

Mr Hong added that Beijing "firmly opposes hacking", has taken steps to prevent it and is also a victim of cyber attacks.'Extensive cyber espionage'

In its unusually detailed report, US-based computer security company Mandiant said it had investigated hundreds of data breaches since 2004, most of which it attributed to what it termed "Advanced Persistent Threat" actors.

The details it had uncovered, it said, "convince us that the groups conducting these activities are based primarily in China and that the Chinese government is aware of them".

The most prolific of these actors is APT1, which Mandiant says it "a single organisation of operators that has conducted a cyber espionage campaign against a broad range of victims since at least 2006".

"From our observations, it is one of the most prolific cyber espionage groups in terms of the sheer quantity of information stolen," it said, adding that it was "likely government-sponsored and one of the most persistent of China's cyber threat actors".

"We believe that APT1 is able to wage such a long-running and extensive cyber espionage campaign in large part because it receives direct government support," said Mandiant.

The firm said it had traced the hacking activities of APT1 to the site of 12-storey building in the Pudong area of Shanghai. It said that Unit 61398 of the People's Liberation Army "is also located in precisely the same area" and that the actors had similar "missions, capabilities and resources".

*stayed inside hacked networks for an average of 356 days, with the longest lasting 1,764 days

*targeted industries identified by China as strategically important under its Five Year Plan for economic growth

'Groundless'

Unit 61398 has for some time been suspected by the US of being central to China's cyber espionage programme, the New York Times reports.

Mandiant admitted there could be one alternative explanation for its findings: that "a secret, resourced organisation full of mainland Chinese speakers with direct access to Shanghai-based telecommunications infrastructure is engaged in a multi-year, enterprise scale computer espionage campaign right outside of Unit 61398's gates, performing tasks similar to Unit 61398's known mission".

Several governments, foreign companies and organisations have said in the past they suspect China of carrying out extensive cyber espionage over periods of several years.

Last month, the New York Times said its systems had been infiltrated over a period of four months, after it wrote a report on the alleged wealth of China's outgoing Premier Wen Jiabao.

Mandiant, which the paper hired to investigate, traced the hack to China. However the paper said its breach had been attributed to a different group. The Wall Street Journal also reported a China-based hack.

At the time, China's foreign ministry dismissed the New York Times accusations as "groundless", saying that to "conclude without hard evidence that China participated in such hacking attacks is totally irresponsible".